We are data protection specialists and this is our flagship training programme for Data Protection Officers, Data Protection Managers, Compliance Managers or anyone with a responsibility for Data Protection. The Data Protection (GDPR) Practitioner Certificate is an internationally recognised qualification, endorsed by TQUK, which is regulated by Ofqual, a UK Government department. It equips current and aspiring data protection officers and data protection managers with knowledge and skills to undertake data protection compliance activities throughout an organisation. It is a valuable course for anybody with data protection compliance responsibilities. The course takes account of the latest developments in this fast moving subject, together with the latest guidance from the ICO and includes real life, practical examples throughout. There are two versions of the course (with the same content and same trainer). The courses priced at £1200 are run by Computer Law Training and lead to the TQUK endorsed certificate. The courses priced at £1440+VAT are run in collaboration with, and are booked through, the Law Society of Scotland and, on successful completion, lead to the TQUK endorsed certificate and a 'Certified Specialist' certification from the Law Society of Scotland. Suitability - Who should attend? The training programme for Data Protection Officers, Data Protection Managers, Compliance Managers, Corporate Governance Managers or anyone with a responsibility for Data Protection. The Data Protection (GDPR) Practitioner Certificate is ideal for you if you: Are already undertaking the role of Data Protection Officer Expect to be filling the post of Data Protection Officer in their current employment Are looking for employment as a Data Protection Officer Have, or expect to have, data protection responsibilities in their organisation Need to advise others on data protection compliance Wish to be able to demonstrate verifiable practical skills and learning in this area. It is suitable for those working in: the public sector, the private sector and the third sector. In either case, it will teach participants essential data protection skills and in depth knowledge. Outcome / Qualification etc. Understand the importance of data protection legislation and compliance in the UK and beyond. Interpret key terminology of the UK GDPR and Data Protection Act 2018 (DPA) in a practical context Understand the key obligations of the UK GDPR and DPA Create appropriate policies and procedures necessary for data protection compliance Carry out a data protection audit and gap analysis Develop an action plan to address a data protection gap analysis Respond appropriately to data protection issues arising in an organisation Carry out the duties of a data protection officer Undertake accountability and risk analysis activities Training Course Content Day 1 Data Protection – history and background GDPR Overview What, really, is personal data Purposes & Legal Bases Day 2 Consent Special Categories of Personal Data Data Subject Rights Transparency Requirements Data Processors and Controllers Information Security Obligations Breach Reporting and Recording Day 3 Restricted (International) Transfers Cloud Services Accountability The Personal Data Audit & Record of Processing The “Accountability Portfolio” Data Protection by Design & Default Data Protection Impact Assessments Privacy Enhancing Technologies Data Protection Officers Direct Marketing & Cookies Day 4 Data Protection Act 2018 HR Issues Risk Frameworks Data Protection Governance Day 5 Data Protection Audit Gap Analysis Action Plan Implementation The ICO and Enforcement Brexit and the future (crystal ball!) The European Data Protection Board (EDPB) Questions Course delivery details The course is delivered on Zoom. It lasts 5 days over 3 weeks, 9.30-16.30. The advertised start date is usually a Tuesday which is the first day of the course. The course normally continues on the Thursday of that week, Tuesday and Thursday the following week and one day in the third week: 24, 26, 31 January & 2, 7 February 2023 The one-hour test to obtain the certificate is online by arrangement in the week or two following the course. The trainer for the course is Tim Musson, who has a Master of Laws degree in IT and Telecoms Law, is a Certified Information Privacy Professional (CIPP/E) and a Certified Information Privacy Technologist (CIPT).
Duration 4 Days 24 CPD hours This course is intended for This course is for Azure Security Engineers who are planning to take the associated certification exam, or who are performing security tasks in their day-to-day job. This course would also be helpful to an engineer that wants to specialize in providing security for Azure-based digital platforms and play an integral role in protecting an organization's data. This course provides IT Security Professionals with the knowledge and skills needed to implement security controls, maintain an organization?s security posture, and identify and remediate security vulnerabilities. This course includes security for identity and access, platform protection, data and applications, and security operations. Prerequisites AZ-104T00 - Microsoft Azure Administrator Security best practices and industry security requirements such as defense in depth, least privileged access, role-based access control, multi-factor authentication, shared responsibility, and zero trust model. Be familiar with security protocols such as Virtual Private Networks (VPN), Internet Security Protocol (IPSec), Secure Socket Layer (SSL), disk and data encryption methods. Have some experience deploying Azure workloads. This course does not cover the basics of Azure administration, instead the course content builds on that knowledge by adding security specific information. Have experience with Windows and Linux operating systems and scripting languages. Course labs may use PowerShell and the CLI. 1 - Manage identities in Microsoft Entra ID Secure users in Microsoft Entra ID Secure groups in Microsoft Entra ID Recommend when to use external identities Secure external identities Implement Microsoft Entra Identity protection 2 - Manage authentication by using Microsoft Entra ID Configure Microsoft Entra Verified ID Implement multifactor authentication (MFA) Implement passwordless authentication Implement password protection Implement single sign-on (SSO) Integrate single sign-on (SSO) and identity providers Recommend and enforce modern authentication protocols 3 - Manage authorization by using Microsoft Entra ID Configure Azure role permissions for management groups, subscriptions, resource groups, and resources Assign built-in roles in Microsoft Entra ID Assign built-in roles in Azure Create and assign a custom role in Microsoft Entra ID Implement and manage Microsoft Entra Permissions Management Configure Microsoft Entra Privileged Identity Management Configure role management and access reviews by using Microsoft Entra Identity Governance Implement Conditional Access policies 4 - Manage application access in Microsoft Entra ID Manage access to enterprise applications in Microsoft Entra ID, including OAuth permission grants Manage app registrations in Microsoft Entra ID Configure app registration permission scopes Manage app registration permission consent Manage and use service principals Manage managed identities for Azure resources Recommend when to use and configure a Microsoft Entra Application Proxy, including authentication 5 - Plan and implement security for virtual networks Plan and implement Network Security Groups (NSGs) and Application Security Groups (ASGs) Plan and implement User-Defined Routes (UDRs) Plan and implement Virtual Network peering or gateway Plan and implement Virtual Wide Area Network, including secured virtual hub Secure VPN connectivity, including point-to-site and site-to-site Implement encryption over ExpressRoute Configure firewall settings on PaaS resources Monitor network security by using Network Watcher, including NSG flow logging 6 - Plan and implement security for private access to Azure resources Plan and implement virtual network Service Endpoints Plan and implement Private Endpoints Plan and implement Private Link services Plan and implement network integration for Azure App Service and Azure Functions Plan and implement network security configurations for an App Service Environment (ASE) Plan and implement network security configurations for an Azure SQL Managed Instance 7 - Plan and implement security for public access to Azure resources Plan and implement Transport Layer Security (TLS) to applications, including Azure App Service and API Management Plan, implement, and manage an Azure Firewall, Azure Firewall Manager and firewall policies Plan and implement an Azure Application Gateway Plan and implement an Azure Front Door, including Content Delivery Network (CDN) Plan and implement a Web Application Firewall (WAF) Recommend when to use Azure DDoS Protection Standard 8 - Plan and implement advanced security for compute Plan and implement remote access to public endpoints, Azure Bastion and just-in-time (JIT) virtual machine (VM) access Configure network isolation for Azure Kubernetes Service (AKS) Secure and monitor AKS Configure authentication for AKS Configure security for Azure Container Instances (ACIs) Configure security for Azure Container Apps (ACAs) Manage access to Azure Container Registry (ACR) Configure disk encryption, Azure Disk Encryption (ADE), encryption as host, and confidential disk encryption Recommend security configurations for Azure API Management 9 - Plan and implement security for storage Configure access control for storage accounts Manage life cycle for storage account access keys Select and configure an appropriate method for access to Azure Files Select and configure an appropriate method for access to Azure Blob Storage Select and configure an appropriate method for access to Azure Tables Select and configure an appropriate method for access to Azure Queues Select and configure appropriate methods for protecting against data security threats, including soft delete, backups, versioning, and immutable storage Configure Bring your own key (BYOK) Enable double encryption at the Azure Storage infrastructure level 10 - Plan and implement security for Azure SQL Database and Azure SQL Managed Instance Enable database authentication by using Microsoft Entra ID Enable and monitor database audit Identify use cases for the Microsoft Purview governance portal Implement data classification of sensitive information by using the Microsoft Purview governance portal Plan and implement dynamic mask Implement transparent data encryption? Recommend when to use Azure SQL Database Always Encrypted 11 - Plan, implement, and manage governance for security Create, assign, and interpret security policies and initiatives in Azure Policy Configure security settings by using Azure Blueprint Deploy secure infrastructures by using a landing zone Create and configure an Azure Key Vault Recommend when to use a dedicated Hardware Security Module (HSM) Configure access to Key Vault, including vault access policies and Azure Role Based Access Control Manage certificates, secrets, and keys Configure key rotation Configure backup and recovery of certificates, secrets, and keys 12 - Manage security posture by using Microsoft Defender for Cloud Implement Microsoft Defender for Cloud Identify and remediate security risks by using the Microsoft Defender for Cloud Secure Score and Inventory Assess compliance against security frameworks and Microsoft Defender for Cloud Add industry and regulatory standards to Microsoft Defender for Cloud Add custom initiatives to Microsoft Defender for Cloud Connect hybrid cloud and multicloud environments to Microsoft Defender for Cloud Identify and monitor external assets by using Microsoft Defender External Attack Surface Management 13 - Configure and manage threat protection by using Microsoft Defender for Cloud Enable workload protection services in Microsoft Defender for Cloud, including Microsoft Defender for Storage, Databases, Containers, App Service, Key Vault, Resource Manager, and DNS Configure Microsoft Defender for Servers Configure Microsoft Defender for Azure SQL Database Manage and respond to security alerts in Microsoft Defender for Cloud Configure workflow automation by using Microsoft Defender for Cloud Evaluate vulnerability scans from Microsoft Defender for Server 14 - Configure and manage security monitoring and automation solutions Monitor security events by using Azure Monitor Configure data connectors in Microsoft Sentinel Create and customize analytics rules in Microsoft Sentinel Configure automation in Microsoft Sentinel Additional course details: Nexus Humans AZ-500T00 Microsoft Azure Security Technologies training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the AZ-500T00 Microsoft Azure Security Technologies course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Person-centred approaches are a core skills framework that articulates what it means to be person-centred and how to develop and support the workforce to work in this way. Developed in partnership with Skills for Health and Skills for Care, the Framework aims to distil best practices and to set out core, transferable behaviours, knowledge and skills. It is applicable across services and sectors and across different types of organisations. Person-centred approaches underpins existing dementia, learning disabilities, mental health and end of life care core skills frameworks. This subject forms standard 5 in The Care Certificate.
Update and renewal option for Geopace Training Certificate holders Update and renew your existing certificate ... Recommended certificate renewal after 18 months Nationally Recognised Dual Accreditations Open College Network Accredited (Advanced Level) CPD Accredited (The CPD Certification Service) Recaps phlebotomy theory incl. legislation Updates your certification and compliancy Awards cumulative credits and CPD points awarded Basic understanding of English language required Download a certificate on completion of your online course APPLICANTS ARE REQUIRED TO HAVE COMPLETED AN ACCREDITED INTRODUCTION TO PHLEBOTOMY COURSE
Duration 4 Days 24 CPD hours This course is intended for Students in this course are interested in Microsoft Teams or in passing the Microsoft Teams Administrator Associate certification exam. A Microsoft Teams administrator plans, deploys, configures, and manages Microsoft Teams to focus on efficient and effective collaboration and communication in a Microsoft 365 environment. A Microsoft Teams administrator must be able to plan, deploy, and manage teams, chat, apps, channels, meetings, audio/video conferencing, live events, calling, and Teams certified devices. A Microsoft Teams administrator has experience integrating Microsoft Teams with SharePoint, OneDrive, Exchange, Microsoft 365 Groups, and other Microsoft, third-party, and custom apps. A Microsoft Teams administrator understands and collaborates with other workloads and roles, such as Network, Voice, Identity, Access, Devices, Licensing, Security, Compliance, Information management, and User Adoption. Overview What is Microsoft Teams and how the components work together How to implement Governance, Security and Compliance for Microsoft Teams How to prepare an organizations environment for a Microsoft Teams deployment How to deploy and manage teams How to manage collaboration and communication experiences in Microsoft Teams Techniques to manage and troubleshoot communication in Microsoft Teams The Managing Microsoft Teams course is designed for persons who are aspiring to the Microsoft 365 Teams Admin role. A Microsoft Teams administrator plans, deploys, configures, and manages Microsoft Teams to focus on efficient and effective collaboration and communication in a Microsoft 365 environment. In this course, you will learn about various Teams management tools, security and compliance feature for Teams, network requirement for Teams deployment as well as different Teams settings and policies for managing collaboration and communication experience in Teams. Prerequisites A proficient understanding of basic functional experience with Microsoft 365 services. A proficient understanding of general IT practices, including using PowerShell. 1 - Explore Microsoft Teams Explore capabilities in Microsoft Teams Explore Microsoft Teams integration with Microsoft 365 Explore Microsoft Teams integration with Microsoft Power Platform Illustrate Microsoft Teams architecture Describe Microsoft Teams with Microsoft 365 Groups Describe Microsoft Teams with SharePoint and OneDrive Describe Microsoft Teams with Exchange Understand Microsoft Teams certified solutions 2 - Plan and deploy Microsoft Teams Designate Teams admin roles Understand Teams management tools Plan for Teams rollout Plan for Teams adoption Plan for Teams licensing Deploy Microsoft Teams clients 3 - Implement lifecycle management and governance for Microsoft Teams Plan for lifecycle management Plan for Teams governance Manage Microsoft 365 Groups creation Configure Microsoft 365 Groups expiration policy Configure Microsoft 365 Groups naming policy Plan policy assignment for users and groups Create and manage policy packages Manage Teams preview features using Teams update policies Create and manage teams templates and template policies 4 - Monitor your Microsoft Teams environment Monitor Microsoft Teams usage reports Monitor Microsoft 365 usage reports Interpret Microsoft Adoption Score Manage user access with Azure Active Directory access reviews Monitor the Microsoft 365 network connectivity dashboard Manage Teams notifications and alerts Manage feedback policies 5 - Manage access for external users Understand features in Azure Active Directory Work with external users in Microsoft Teams Manage access for external users Manage external collaboration in Azure AD Manage external collaboration in Microsoft 365 Manage external access in Microsoft Teams Manage guest access in Microsoft Teams Manage file sharing in SharePoint and OneDrive 6 - Implement security for Microsoft Teams Configure conditional access and multifactor authentication for Microsoft Teams Configure Safe Attachments for Microsoft Teams Configure Safe Links for Microsoft Teams Examine the Defender for Cloud Apps Monitor security reports for Microsoft Teams Plan and configure enhanced encryption policies 7 - Implement compliance for Microsoft Teams Create and manage sensitivity labels Create and manage retention policies Create and manage Data Loss Prevention policies Deploy communication compliance Enable scoped directory search Create information barrier policy Create security and compliance alerts for Microsoft Teams 8 - Plan and configure network settings for Microsoft Teams Examine network requirements for Microsoft Teams Plan for network deployment using Network Planner Configure network ports and protocols for Microsoft Teams Implement Quality of Service Configure reporting labels for location-enhanced Call Analytics reports Configure tenant data for Call Quality Dashboard reports Assess network readiness Manage network topology 9 - Create and manage teams Create teams Create a team from existing resources Plan and create org-wide teams Manage teams Manage users in a team Configure dynamic membership Archive restore and delete a team 10 - Manage collaboration experiences for chat and channels Create and manage channels in a team Create and manage Teams policies for channels Configure teams settings Create and manage messaging policies Manage channel moderation Manage access to channels 11 - Manage apps for Microsoft Teams Explore apps in Microsoft Teams Describe admin settings for Teams apps Manage access to Teams apps at the organization level Create and manage app permission policies Create and manage app setup policies Manage permissions and consent for Teams apps Plan and configure connectors Manage custom apps uploads Publish custom apps to Microsoft Teams Manage purchasing of apps in the Microsoft Teams app store Customize the organization's app store Customize the branded experience of an app 12 - Introduction to Teams meetings and calling Overview of Teams meetings and events Overview of Teams Phone Overview of auto attendants and call queues Overview of Teams devices 13 - Manage meetings and events experiences Explore meetings and events in Microsoft Teams Configure meeting settings Create and manage meeting policies Configure audio conferencing Create and manage meeting templates and template policies Create and manage meetings customization policies Configure live events settings Create and manage live events policies Examine live events across Microsoft 365 14 - Plan for Microsoft Teams Rooms and Surface Hub Determine license requirements for Microsoft Teams Rooms and shared devices Understand differences between Microsoft Teams Rooms on Android and Windows Understand Microsoft Teams Rooms on Surface Hub 2S Understand and plan Teams Room accessories, components, and peripherals Understand Teams Rooms management options 15 - Configure, deploy, and manage Teams devices Manage Microsoft Teams Phones Manage Microsoft Teams Room Systems Microsoft Teams Rooms management options Manage Surface Hub 2S devices Configure Microsoft Teams SIP gateway Manage Microsoft Teams displays Remote provisioning and sign in for Teams Phones Update Microsoft Teams devices remotely Manage Microsoft Teams device tags 16 - Plan for Teams Phone Plan to deploy Teams Phone Plan for Teams Phone PSTN connectivity Determine license requirements Plan for Teams Phone devices Plan and design Teams Phone features Plan for voicemail 17 - Configure and deploy Teams Phone Configure emergency calling for Teams Calling Plans Manage and configure Microsoft PSTN numbers Configure Operator Connect and Teams Phone Mobile Configure Teams Phone policies Create and manage Teams policies Configure Audio Conferencing 18 - Configure and manage voice users Enable users for Teams Phone Enable users for Direct Routing with Teams Phone Enable additional calling features for Teams Phone Enable users for Teams Phone Mobile 19 - Configure auto attendants and call queues Design call flows for auto attendants and call queues Configure auto attendants and call queues Deploy a channel-based call queue Configure resource accounts Configure Microsoft 365 groups for voicemail Interpret call queue conference modes Interpret call queue routing methods Configure holidays for auto attendants and call queues Configure custom music on hold 20 - Troubleshoot audio, video, and client issues Troubleshoot Teams Collect and identify logs Clear Microsoft Teams client cache Identify issues with call analytics Identify issues with Call Quality Dashboard Use Power BI to analyze Call Quality Dashboard data Identify issues with the Direct Routing Health Dashboard Additional course details: Nexus Humans MS-700T00 Managing Microsoft Teams training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the MS-700T00 Managing Microsoft Teams course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
This Course is the DSL Course delivered via Zoom (it is the same as the face to face course but delivered via video conferencing and will be no more than 15 people at one time. There will be a training consultant taking delegates through the course and available to answer any questions throughout the course. This course will help you and you become familiar with the role and responsibilities of the designated safeguarding lead in your organisation. It will develop both your competence and confidence in carrying out the role of Designated Safeguarding Lead (DSL). Formally known as Level 3.
Duration 4 Days 24 CPD hours This course is intended for Candidates should be familiar with Dynamics 365 Customer Insights and have firsthand experience with one or more additional Dynamics 365 apps, Power Query, Microsoft Dataverse, Common Data Model, and Microsoft Power Platform. They should also have working knowledge of practices related to privacy, compliance, consent, security, responsible AI, and data retention policy. Overview After completing this course, you will be able to: Clean, transform, and ingest data into Dynamics 365 Customer Insights Create a unified customer profile Work with Dynamics 365 Audience insights Enrich data and predictions Set up and manage external connections Administer and monitor Customer Insights Customer Data Platform specialists implement solutions that provide insight into customer profiles and that track engagement activities to help improve customer experiences and increase customer retention. In this course, students will learn about the Dynamics 365 Customer Insights solution, including how to unify customer data with prebuilt connectors, predict customer intent with rich segmentation, and maintain control of customer data. This specialty course starts with creating a unified profile and then working with customer data. Module 1: Get started with Dynamics 365 Customer Insights Introduction to the customer data platform Administer Dynamics 365 Customer Insights Explore user permissions in Dynamics 365 Customer Insights Module 2: Ingest data into Dynamics 365 Customer Insights Import and transform data Connect to data sources Work with data Module 3: Create a unified customer profile in Dynamics 365 Customer Insights Map data Match data Merge data Find customers Module 4: Work with Dynamics 365 Customer Insights Explore Audience insights Define relationships and activities Work with measures Work with segments Module 5: Enrich data and predictions with Audience insights Enrich data Use predictions Use machine learning models Module 6: Manage external connections with Customer Data Platform Export Customer Insights data Use Customer Insights with Microsoft Power Platform Display Customer Insights data in Dynamics 365 apps More ways to extend Customer Insights
Help with chronic pain – learn the powerful psychological and behavioural techniques that alleviate persistent pain and accelerate healing with pain specialist Dr Grahame Brown Accredited CPD Certificate: 6 hours Length: 1 day (9.30am - 4.00pm GMT) Fantastic to have the opportunity to train with this specialist. Thoroughly enjoyed this online course – the best I have attended...CLINCIAL HYPNOTHERAPIST Live online training – Join Dr Grahame Brown on Wednesday 24th April 2024 for this practical live online training event via Zoom, you will have plenty of opportunities to ask questions. Simply book your place and we will email you the Zoom link the day before the event. BONUS RECORDING – the training is recorded, in case anyone experiences technical difficulties on the day, so you will also get a recording for a limited time afterwards to maximise your learning. Can’t make this date? Register your interest and we’ll let you know when there’s another. Why you should attend Pain is endemic in our society and whatever the cause – back pain, migraine, arthritic pain, dental pain, irritable bowel (IBS), labour/menstrual pain, cancer pain, psychogenic pain, psychosomatic pain – it can be incapacitating. Chronic pain is any pain which lasts for more than three months and it is estimated that between 25–40% of our population suffer from persistent or chronic pain. The sociological and economic costs of this are enormous but it is in the personal human suffering involved – mental as well as physical – that the real costs should be measured. Many are desperate for effective help to relieve their pain and the associated effects, such as insomnia and depression. This online workshop – with leading pain and musculoskeletal medicine consultant Dr Grahame Brown – gives you important new information about how we experience pain – derived from the latest neuroscience – and a powerful range of psychological techniques for managing pain naturally, preventing it from escalating and speeding up healing. You will discover how people can be helped out of the vicious cycle of chronic pain and how, by working holistically through the bio-psycho-social model, suffering can be dramatically reduced. You don’t need to have any prior medical knowledge to learn from and enjoy the day – you will leave with a much clearer understanding of what is going on in the mind/body system, what you can do to reduce suffering when pain persists and ways to prevent chronic ongoing pain from developing. It is a key event if you work with people suffering from pain at any stage (from recent onset, recurrent to persistent) or if you would like to find out how to successfully manage pain without medication. You will learn a wide variety of pain management techniques, which can easily be integrated into your work, to help relieve pain and promote recovery – often in just one session. Dr Grahame Brown has a real gift for helping people heal themselves – I know: I’m one of them!CHRISTOPHER BUCKLEY, PROFESSOR OF RHEUMATOLOGY, UNIVERSITY OF BIRMINGHAM What will you learn An increased understanding of how we perceive pain (from the latest neuroscientific research) and what is happening in the mind/body system A road map for helping people out of the vicious cycle of chronic pain, or to stop it developing in the first place The confidence and skills to help patients suffering from persistent pain of whatever cause – no need to feel ‘heart-sink’ with some patients anymore An understanding of what is going on when pain persists – and what you can do about it How to reduce the risk of chronic pain developing – prevention is better than cure – and identify the factors that make it likely A range of psychological chronic pain management techniques to use with your patients or yourself The importance of the bio-psycho-social model in reducing pain and accelerating healing How to produce significant pain relief by changing the way people think about their pain – in minutes An understanding of the value of pain displacement and how to use the brain’s ‘reality simulator’ What the latest neuroscience tell us about the experience of pain How to use guided imagery, relaxation and distraction to promote chronic pain relief How to deal with constant pain and promote healing How healthcare professionals can make their consultations more therapeutic How to avoid labelling patients’ pain as ‘purely psychological’ The many myths about pain – and why some well-intentioned pain management techniques don’t work and more… No prior medical knowledge is needed for you to benefit from the day. Course Programme The ‘Effective Pain Management’ live online course starts at 9.15am and runs until 4.00pm. (GMT). 9.15am Join the Zoom meeting 9.30am Understanding pain 11.00am Comfort break and discussion 11.30am Assessing a person with persistent pain 1.00pm Lunch break 1.45pm Psychological & Behavioural treatment interventions 2.45pm Comfort break and discussion 3.00pm Practical demonstration of interventions 4.00pm Day ends Who is this course suitable for? This course is designed to enhance the skills and knowledge of health care professionals of any discipline who work on a regular or occasional basis with people in pain to improve outcomes, including: • doctors • surgeons • nurses • dentists • neurologists • osteopaths • chiropractors • palliative care workers • psychiatrists • midwives • physiotherapists • occupational therapists • psychologists • health visitors • support/care workers • psychotherapists • counsellors – it is perfect CPD If you personally experience persistent pain then you will gain much from the workshop but please be aware the programme is not designed to be a treatment day and the tutor will be unable to give opinions to individuals with pain problems unless (with consent) their problem can be discussed for the benefit of all participants Anyone who would like to understand more about their own experience of pain, or that of someone they care for, and what can be done to manage ongoing pain and alleviate suffering This course has been independently assessed by the internationally recognised CPD Standards Office for 6 hours of CPD training. On completion of this training you’ll receive CPD certificates from the College and the CPD Standards Office.
Duration 2 Days 12 CPD hours This course is intended for Data Protection Officers Data Protection Managers Auditors Legal Compliance Officers Security Manager Information Managers Anyone involved with data protection processes and programmes Overview Principles of Privacy Program Management is the how-to training on implementing a privacy program framework, managing the privacy program operational lifecycle and structuring a knowledgeable, high-performing privacy team. Those taking this course will learn the skills to manage privacy in an organization through process and technology?regardless of jurisdiction or industry. The Principles of Privacy Program Management training is based on the body of knowledge for the IAPP?s ANSI accredited Certified Information Privacy Manager (CIPM) certification program. Founded in 2000, the IAPP is the world?s largest and most comprehensive privacy resource with a mission to define, support and improve the Privacy profession globally. Every organization has data protection needs. Every day, we access, share and manage data across companies, continents and the globe. Knowing how to implement a privacy program is an invaluable skill that will help you protect your organization?s data?and take your career to the next level. Our Principles of Privacy Program Management training is the premier course on implementing a privacy program framework, managing the privacy program operational lifecycle and structuring a privacy team. Introduction to privacy program management Privacy program management responsibilities Accountability in privacy program management Privacy governance Considerations for developing and implementing a privacy program Position of the privacy function within an organization Role of the DPO Program scope and charter Privacy strategy Support and ongoing involvement of key functions and privacy frameworks Applicable laws and regulations The regulatory environment Common elements across jurisdictions Strategies for aligning compliance with organizational strategy Data assessments Practical processes for creating and using data inventories/maps Generating and applying gap analyses Privacy assessments Privacy impact assessments/data protection impact assessments Vendor assessments Policies Common types of privacy-related policies Policy components Strategies for implementation Data subject rights Operational considerations for communicating and ensuring data subject rights Privacy notice Choice and consent Access and rectification Data portability Erasure Training and awareness Developing privacy training and awareness programs Implementing privacy training and awareness programs Protecting personal information Holistic approach to protecting personal information Privacy by design Data breach incident plans Planning for a data security incident or breach Responding to a data security incident or breach Monitoring and auditing program performance Common practices for monitoring privacy program performance Measuring, analyzing and auditing privacy programs Additional course details: Nexus Humans Certified Information Privacy Manager (CIPM) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Certified Information Privacy Manager (CIPM) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Learn the Art and Science of EFT (Emotional Freedom Techniques or “The Tapping Technique”) in this EFT workshop and join millions worldwide who are learning this life-changing technique. EFT, commonly referred to as Tapping, has gained rapid popularity because it has been demonstrated to quickly and effectively resolve dysfunctional feelings, thoughts, behaviors and beliefs which can lead to challenges in relationships, health, work and more. Basically, if there are negative emotions and stress involved, EFT may well be able to resolve those aspects that can lead to significant relief and ease in one’s life. Learn to implement this powerful mind-body approach which is supported by peer-reviewed research, drawing from the fields of interpersonal neurobiology, neuroplasticity models and the field of epigenetics. If you are ready to transform your health, your relationships and your vision of who you truly are, then come join us to learn EFT Tapping techniques. If your life is grounded in being of service to others, then EFT will quickly become your tool of choice. Whether you are curious about EFT for self-help or you are in the healing/helping professions, this training will give you confidence in the art of its delivery. From the professional working with clients to the laymen looking for self-application, everyone walks away having the skills to succeed with this extraordinary healing modality. This online format did not at all hinder the delivery of the content and technique whatsoever and we were able to do everything that we could have done in person. Alina and Craig created a very safe space, gave us plenty of demos, lots of practice time and welcomed all of our questions. They also broke up the day with ample breaks and Eden energy exercises to help avoid screen fatigue. Alina and Craig are experts in their field and top-notch EFT instructors. I highly recommend their online courses.— CARSON HILL EFT LEVEL 1 The Basics The preparation for the EFT Level 1 includes approximately 3 hours of advance work, including watching several short online videos and the reading of 2 articles that explore both the history of EFT and the scientific premises for how EFT works. Note that last minute signups will not be allowed without contacting us due to this requirement. EFT Level 1, The Basics, is the foundation of any EFT training. It covers the core aspects of EFT with a focus on how you can use tapping as a self help tool and how to teach your clients how to apply it as a self-regulating technique. Learn how to apply EFT for issues related to physical symptoms, for cravings and addictions and more. See below for an outline of materials covered. An outline of subject matter covered in this first day include: The Science Behind EFT Understanding Shifting Aspects The Importance of Being Specific Psychological Reversal & Secondary Gain Cognitive Belief Shifts How Traumatic Events Imprint on the Brain Finding the Right Words to Use An introduction to both Tell the Story and the Movie Techniques for working with traumatic events The Movie Technique Working with Pain and Physical Symptoms EFT for Cravings and Aspects of Addictions Participants who take this program will be issued a Certificate of Attendance that they have completed EFT Level 1. This is the first step along the path to obtain Certified EFT Practitioner through EFT International, but should not be put forth as a certification in itself. I wholeheartedly recommend training in EFT with Craig and Alina. I recently took their EFT level 1 and 2 live online training and it was a fantastic experience. The virtual environment in Zoom was great and everything worked perfectly, and I learned so many things. I appreciate the way they break down important concepts and share their many years of experience, and the emphasis they put on generating and maintaining safety and rapport with the client at all times.— BRUNO SADE, PSYCHOLOGIST EFT LEVEL 2 Foundational Skills The two-day EFT Level 2 workshop is designed for those practitioners who have taken the pre-requisite EFT Level 1 and are either in practice or preparing to be and will be able to apply EFT when working with clients. This may include but not be limited to social workers, counselors, therapists, health care practitioners, life coaches and those who may be wishing to pursue EFT certification. It reviews and expands upon the basic aspects of the Art and Science of EFT taught in the EFT 1 course. Additional techniques are taught to expand your repertoire and offer skillful and effective ways of working with different client populations and expanding your ability to work with deeper issues. Of course, as in all EFT Tapping Training workshops, new material is presented using a variety of learning styles including partnered teaching methods, demonstrations, paired and small group experiential applications, video examples and more to ensure that no one walks away without fully understanding everything that is taught. Most importantly, this EFT Level 2 workshop will hone your practice skills. Greater attention and time will be spent on personal observation to assist you in mastering the techniques learned. Enhanced instruction on asking key questions for uncovering core issues will be provided. The following subject matter will be taught in Level 2 with an emphasis on personal practice of techniques learned with direct observation and support from the trainers: The Gentle Techniques for Intense Issues including Sneaking Up on the problem, Tearless Trauma and the somato-emotional process of Chasing the Pain (Sensation) Understanding the Nature of and working with Traumatic Events Clearing Limiting Beliefs Questions for Uncovering Core Issues Core Issues and Physical Symptoms Working over the Telephone or Internet EFT in Groups Using EFT with Children Scope of Practice, Informed Consent and the EFT Ethics Code Participants who take this program will be issued a Certificate of Attendance that they have completed EFT Level 2. This is the second instructional step along the certification path for EFT International Accredited Certified EFT Practitioner, but should not be put forth as a certification in itself. Read about EFT and course descriptions Presenting Certified Trainers Alina Frank and Craig Weiner, DC Cost For the combination three day Level 1 and 2 combined training, the tuition is $799 ($749 early bird special if purchased 30 days prior to the workshop start date). Both EFT Levels 1 and 2 are pre-requisites for EFT International EFT certification. Location Online Hours Both EFT Level 1 and 2 training courses begin promptly at 9 am with registration beginning at 8:30 am Seattle/Los Angeles time zone. A 15 minute break is provided in the morning and afternoon. A 90 minute lunch break is offered beginning at approximately 12:30 pm. The class ends each day at 6 pm. EFT International Certification Process Attendance and completion of this training in no way constitutes “certification” and no attendee should consider themselves or promote themselves as a Certified EFT Practitioner based solely upon attendance of this training. All the requirements for completing certification will be discussed during the workshop and can be found on our EFT Certification page. Alina Frank and Dr Craig Weiner have taught and mentored thousands of individuals and professionals throughout the North America and Europe and are sought after speakers and presenters in the field of EFT instruction and EFT practice development and are EFT International Accredited Master Trainers and EFT International Supervising Mentors. CEUs, Certificates & Letters of Completion Approved Continuing Education Hours 24 CEUs have been pre-approved for NY LMHCs and may be available through 716CEU, LLC which is recognized by the New York State Education Department’s State Board for Mental Health Practitioners as an approved provider of continuing education for licensed mental health counselors. #MHC-0241. Please inquire for further details regarding whether this specific training will have CEs offered and any requirements and costs involved for receiving CEs. 24 CE hours for NY Social Workers have been pre-approved and may be available through Tree of Hope Counseling, an approved NYS Continuing Education Contact Hours (CEU) provider for Social Workers (#SW0322). Please inquire for further details regarding whether this specific training will have CEs offered and any requirements and costs involved for receiving CEs. The EFT Tapping Training Institute, with Craig Weiner and Alina Frank as trainers, have been pre-approved for 24 continuing education credit hours for online Emotional Freedom Techniques Level 1-2 training for the Canadian Counselling and Psychotherapy Association. Members of CCPA will receive transcripts at no cost listing all attended events assessed as Continuing Education Credit. Non‐members must attach a cheque for $30.00 payable to CCPA to have CEC’s recorded and to have a transcript issued. Every person who fully attends the workshop training will receive a completion certificate with the course hours listed. Certificates of Completion Official Letters of Completion are available upon request for courses. They are signed by our Trainers, has the attendees name, date of completion and the number of educational hours. The letter will be sent to the course participant as a PDF email attachment. It is the responsibility of each participant to submit the letter to the appropriate certifying board in order to determine if they will receive any type of credit. Certificates of Completion for Courses Participants of the following courses offered by the EFT Tapping Training Institute may receive a Certificate of Completion upon graduation (provided in a PDF format and sent via email): EFT Levels 1-2 EFT Level 3 Matrix Reimprinting Foundational Training Other courses may be able to provide either a Certificate of Completion or a Letter of Completion upon graduation. BIPOC Scholarship Program Please visit our Scholarship Guidelines & Application page for details. Cancellation Policy A complete refund, minus $150 administration fee, is given up to 3 weeks (21 days) prior to workshop’s start date. If cancellation occurs for any reason within the 3 weeks prior to the event, the student may apply the tuition paid towards any future EFT or Matrix Reimprinting workshops offered by us. AS THERE IS MATERIAL TO REVIEW PRIOR TO THE FIRST DAY OF TRAINING, REGISTRATION CLOSES 24 HOURS BEFORE THE START OF THE TRAINING SO THAT YOU CAN REVIEW THE MATERIALS IN ADVANCE. IF YOU DO NOT RECEIVE THE LINK OF THIS MATERIAL VIA EMAIL WITHIN 24 HOURS OF REGISTERING, PLEASE CONTACT US IMMEDIATELY.